default search action
Antonio Lioy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Marco de Benedictis, Ludovic Jacquin, Ignazio Pedone, Andrea S. Atzeni, Antonio Lioy:
A novel architecture to virtualise a hardware-bound trusted platform module. Future Gener. Comput. Syst. 150: 21-36 (2024) - [c85]Diana Gratiela Berbecaru, Antonio Lioy:
Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections. ARES 2024: 125:1-125:9 - [c84]Lorenzo Ferro, Enrico Bravi, Silvia Sisinni, Antonio Lioy:
SAFEHIVE: Secure Attestation Framework for Embedded and Heterogeneous IoT Devices in Variable Environments. SAT-CPS@CODASPY 2024: 41-50 - [c83]Grazia D'Onghia, Diana Gratiela Berbecaru, Antonio Lioy:
Shaping a Quantum-Resistant Future: Strategies for Post-Quantum PKI. ISCC 2024: 1-6 - [c82]Silvia Sisinni, Diana Gratiela Berbecaru, Valerio Donnini, Antonio Lioy:
MATCH-IN: Mutual Attestation for Trusted Collaboration in Heterogeneous IoT Networks. ISCC 2024: 1-6 - [c81]Flavio Ciravegna, Giacomo Bruno, Antonio Lioy:
IKE-less IPsec: Enhancing Security for IoT Device Networks. ITASEC 2024 - [c80]Lorenzo Ferro, Antonio Lioy:
Standard-Based Remote Attestation: The Veraison Project. ITASEC 2024 - [c79]Grazia D'Onghia, Flavio Ciravegna, Giacomo Bruno, Mattin Antartiko Elorza Forcada, Antonio Pastor, Antonio Lioy:
Securing 5G: Trusted Execution Environments for Centrally Controlled IPsec Integrity. IFIP Networking 2024: 595-597 - [c78]Enrico Bravi, Antonio Lioy, Diana Gratiela Berbecaru:
Integrity Management in Softwarized Networks. NOMS 2024: 1-7 - 2023
- [j46]Diana Gratiela Berbecaru, Silvia Sisinni, Antonio Lioy, Benoit Rat, Davide Margaria, Andrea Vesco:
Mitigating Software Integrity Attacks With Trusted Computing in a Time Distribution Network. IEEE Access 11: 50510-50527 (2023) - [j45]Diana Gratiela Berbecaru, Antonio Lioy:
An Evaluation of X.509 Certificate Revocation and Related Privacy Issues in the Web PKI Ecosystem. IEEE Access 11: 79156-79175 (2023) - [c77]Enrico Bravi, Diana Gratiela Berbecaru, Antonio Lioy:
A Flexible Trust Manager for Remote Attestation in Heterogeneous Critical Infrastructures. CloudCom 2023: 91-98 - [c76]Francesco Settanni, Leonardo Regano, Cataldo Basile, Antonio Lioy:
A Model for Automated Cybersecurity Threat Remediation and Sharing. NetSoft 2023: 492-497 - [e6]Antonio F. Skarmeta, Daniele Canavese, Antonio Lioy, Sara Nieves Matheu:
Digital Sovereignty in Cyber Security: New Challenges in Future Vision - First International Workshop, CyberSec4Europe 2022, Venice, Italy, April 17-21, 2022, Revised Selected Papers. Communications in Computer and Information Science 1807, Springer 2023, ISBN 978-3-031-36095-4 [contents] - 2022
- [j44]Daniele Canavese, Leonardo Regano, Cataldo Basile, Gabriele Ciravegna, Antonio Lioy:
Encryption-agnostic classifiers of traffic originators and their application to anomaly detection. Comput. Electr. Eng. 97: 107621 (2022) - [j43]Ignazio Pedone, Antonio Lioy:
Quantum Key Distribution in Kubernetes Clusters. Future Internet 14(6): 160 (2022) - [j42]Silvia Sisinni, Davide Margaria, Ignazio Pedone, Antonio Lioy, Andrea Vesco:
Integrity Verification of Distributed Nodes in Critical Infrastructures. Sensors 22(18): 6950 (2022) - [c75]Maxime Compastié, Silvia Sisinni, Supreshna Gurung, Carolina Fernández, Ludovic Jacquin, Izidor Mlakar, Valentino Safran, Antonio Lioy, Ignazio Pedone:
PALANTIR: Zero-Trust Architecture for Managed Security Service Provider. C&ESAR 2022: 83-98 - [c74]Daniele Canavese, Leonardo Regano, Antonio Lioy:
Computer-Aided Reverse Engineering of Protected Software. CyberSec4Europe 2022: 3-15 - [c73]Antonio Lioy, Ignazio Pedone, Silvia Sisinni:
(POSTER) Using MACsec to protect a Network Functions Virtualisation infrastructure. ISCC 2022: 1-3 - [c72]Carolina Fernández, Davide Sanvito, Orestis Kompougias, Valentino Safran, Maxime Compastié, Ignazio Pedone, Antonio López Martínez, Manuel Gil Pérez, Akis Kourtis, George Xylouris, Izidor Mlakar, Stylianos Tsarsitalidis, Dimitrios Klonidis, Daniele Canavese, Vangelis Logothetis, Diego R. López, Antonio Pastor, Antonio Lioy, Ludovic Jacquin, Supreshna Gurung, Roberto Bifulco, Athanasios Priovolos, Ilias Balampanis, Theodoros Rokkas, Nikolaos Papadakis, Dimitris Paraschos, Primoz Jeran, George Athanasiou, Dimitris Papadopoulos:
PALANTIR demo: leveraging SecaaS model for managing threats in industrial environments. MeditCom 2022: 82-85 - [c71]Cataldo Basile, Daniele Canavese, Leonardo Regano, Ignazio Pedone, Antonio Lioy:
A model of capabilities of Network Security Functions. NetSoft 2022: 474-479 - 2021
- [j41]Ignazio Pedone, Andrea S. Atzeni, Daniele Canavese, Antonio Lioy:
Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment. IEEE Access 9: 115270-115291 (2021) - [j40]Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
On Enabling Additional Natural Person and Domain-Specific Attributes in the eIDAS Network. IEEE Access 9: 134096-134121 (2021) - [j39]Xavi Masip-Bruin, Eva Marín-Tordera, José Ruiz, Admela Jukan, Panagiotis Trakadas, Ales Cernivec, Antonio Lioy, Diego R. López, Henrique Santos, Antonis Gonos, Ana Silva, José Soriano, Grigorios Kalogiannis:
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture. Sensors 21(18): 6057 (2021) - [c70]Diana Gratiela Berbecaru, Antonio Lioy:
Attack Strategies and Countermeasures in Transport-Based Time Synchronization Solutions. IDC 2021: 203-213 - [c69]Evangelos Mantas, Dimitris Papadopoulos, Carolina Fernández, Nil Ortiz, Maxime Compastié, Antonio López Martínez, Manuel Gil Pérez, Akis Kourtis, George Xylouris, Izidor Mlakar, Stylianos Tsarsitalidis, Dimitrios Klonidis, Ignazio Pedone, Daniele Canavese, Gregorio Martínez Pérez, Davide Sanvito, Vangelis Logothetis, Diego R. López, Antonio Pastor, Antonio Lioy, Ludovic Jacquin, Roberto Bifulco, Angeliki Kapodistria, Athanasios Priovolos, Georgios Gardikis, Ioannis Neokosmidis, Theodoros Rokkas, Nikolaos Papadakis, Dimitris Paraschos, Primoz Jeran, Antonis Litke, George Athanasiou:
Practical Autonomous Cyberhealth for resilient Micro, Small and Medium-sized Enterprises. MeditCom 2021: 500-505 - 2020
- [j38]Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach. IEEE Access 8: 126186-126200 (2020) - [j37]Antonio Pastor, Alberto Mozo, Stanislav Vakaruk, Daniele Canavese, Diego R. López, Leonardo Regano, Sandra Gómez Canaval, Antonio Lioy:
Detection of Encrypted Cryptomining Malware Connections With Machine and Deep Learning. IEEE Access 8: 158036-158055 (2020) - [j36]Marco de Benedictis, Antonio Lioy, Paolo Smiraglia:
Towards a secure and lightweight network function virtualisation environment. Int. J. Grid Util. Comput. 11(2): 243-252 (2020) - [j35]Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(2): 34-54 (2020)
2010 – 2019
- 2019
- [j34]Marco de Benedictis, Antonio Lioy:
Integrity verification of Docker containers for a lightweight cloud environment. Future Gener. Comput. Syst. 97: 236-246 (2019) - [j33]Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure. Inf. 10(6): 210 (2019) - [j32]Ignazio Pedone, Antonio Lioy, Fulvio Valenza:
Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions. Secur. Commun. Networks 2019: 2425983:1-2425983:11 (2019) - [j31]Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
Providing digital identity and academic attributes through European eID infrastructures: Results achieved, limitations, and future steps. Softw. Pract. Exp. 49(11): 1643-1662 (2019) - [j30]Cataldo Basile, Fulvio Valenza, Antonio Lioy, Diego R. López, Antonio Pastor Perales:
Adding Support for Automatic Enforcement of Security Policies in NFV Networks. IEEE/ACM Trans. Netw. 27(2): 707-720 (2019) - [c68]Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
Authorize-then-Authenticate: Supporting Authorization Decisions Prior to Authentication in an Electronic Identity Infrastructure. IDC 2019: 313-322 - [c67]Marco de Benedictis, Antonio Lioy:
A proposal for trust monitoring in a Network Functions Virtualisation Infrastructure. NetSoft 2019: 1-9 - [i6]Diana Berbecaru, Antonio Lioy:
Towards Simplifying PKI Implementation: Client-Server based Validation of Public Key Certificates. CoRR abs/1910.06641 (2019) - [i5]Diana Berbecaru, Antonio Lioy:
Preliminary steps in designing and implementing a privilege verifier for PMI. CoRR abs/1910.07930 (2019) - [i4]Diana Berbecaru, Antonio Lioy, Marius Marian:
A Framework for Secure Digital Administration. CoRR abs/1910.07945 (2019) - [i3]Diana Berbecaru, Antonio Lioy, Marius Marian, Diana Marano:
Secure Digital Administration in Medical Environment. CoRR abs/1910.09027 (2019) - 2018
- [j29]Fulvio Valenza, Antonio Lioy:
User-oriented Network Security Policy Specification. J. Internet Serv. Inf. Secur. 8(2): 33-47 (2018) - [j28]Alessio Viticchié, Cataldo Basile, Fulvio Valenza, Antonio Lioy:
On the impossibility of effectively using likely-invariants for software attestation purposes. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 1-25 (2018) - [c66]Marco de Benedictis, Antonio Lioy, Paolo Smiraglia:
Container-based design of a Virtual Network Security Function. NetSoft 2018: 55-63 - 2017
- [j27]Cataldo Basile, Daniele Canavese, Christian Pitscheider, Antonio Lioy, Fulvio Valenza:
Assessing network authorization policies via reachability analysis. Comput. Electr. Eng. 64: 110-131 (2017) - [j26]Fulvio Valenza, Tao Su, Serena Spinoso, Antonio Lioy, Riccardo Sisto, Marco Vallini:
A formal approach for network security policy validation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(1): 79-100 (2017) - [j25]Fulvio Valenza, Cataldo Basile, Daniele Canavese, Antonio Lioy:
Classification and Analysis of Communication Protection Policy Anomalies. IEEE/ACM Trans. Netw. 25(5): 2601-2614 (2017) - [c65]Alessio Viticchié, Cataldo Basile, Antonio Lioy:
Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions. CRiSIS 2017: 66-82 - [c64]Paolo Smiraglia, Marco de Benedictis, Andrea S. Atzeni, Antonio Lioy, Massimiliano Pucciarelli:
The FICEP Infrastructure - How We Deployed the Italian eIDAS Node in the Cloud. e-Democracy 2017: 196-210 - [c63]Georgios Gardikis, K. Tzoulas, K. Tripolitis, A. Bartzas, Socrates Costicoglou, Antonio Lioy, Bernat Gastón, Carolina Fernandez, Cristian Dávila, Antonios Litke, Nikolaos Papadakis, Dimitris Papadopoulos, Antonio Pastor, Jerónimo Núñez, Ludovic Jacquin, Hamza Attak, N. Davri, George Xylouris, M. Kafetzakis, Dimitris Katsianis, Ioannis Neokosmidis, M. Terranova, C. Giustozzi, T. Batista, R. Preto, Eleni Trouva, Y. Angelopoulos, Akis Kourtis:
SHIELD: A novel NFV-based cybersecurity framework. NetSoft 2017: 1-6 - [c62]Antonio Lioy, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Marco de Benedictis, Y. Angelopoulos, C. Xylouris:
NFV-based network protection: The SHIELD approach. NFV-SDN 2017: 1-2 - [c61]Marco de Benedictis, Antonio Lioy:
On the establishment of trust in the cloud-based ETSI NFV framework. NFV-SDN 2017: 280-285 - [c60]Leonardo Regano, Daniele Canavese, Cataldo Basile, Antonio Lioy:
Towards Optimally Hiding Protected Assets in Software Applications. QRS 2017: 374-385 - [p4]Antonio Lioy, Tao Su, Adrian L. Shaw, Hamza Attak, Diego R. López, Antonio Pastor:
Trust in SDN/NFV Environments. Guide to Security in SDN and NFV 2017: 103-124 - [p3]Hamza Attak, Marco Casassa Mont, Cristian Dávila, Eleni-Constantina Davri, Carolina Fernandez, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Antonio Lioy, Antonis Litke, Nikolaos K. Papadakis, Dimitris Papadopoulos, Jerónimo Núñez, Eleni Trouva:
SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment. Guide to Security in SDN and NFV 2017: 197-225 - [i2]Fulvio Valenza, Cataldo Basile, Daniele Canavese, Antonio Lioy:
Classification and Analysis of Communication Protection Policy Anomalies. CoRR abs/1708.02175 (2017) - 2016
- [j24]Cataldo Basile, Daniele Canavese, Antonio Lioy, Christian Pitscheider, Fulvio Valenza:
Inter-function anomaly analysis for correct SDN/NFV deployment. Int. J. Netw. Manag. 26(1): 25-43 (2016) - [c59]Fulvio Valenza, Marco Vallini, Antonio Lioy:
Online and Offline Security Policy Assessment. MIST@CCS 2016: 101-104 - [c58]Diana Berbecaru, Antonio Lioy:
On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure. ISCC 2016: 1263-1269 - [c57]Diana Berbecaru, Antonio Lioy:
Efficient Attribute Management in a Federated Identity Management Infrastructure. PDP 2016: 590-595 - [c56]Leonardo Regano, Daniele Canavese, Cataldo Basile, Alessio Viticchié, Antonio Lioy:
Towards Automatic Risk Analysis and Mitigation of Software Applications. WISTP 2016: 120-135 - 2015
- [j23]Diego Montero, Marcelo Yannuzzi, Adrian L. Shaw, Ludovic Jacquin, Antonio Pastor, René Serral-Gracià, Antonio Lioy, Fulvio Risso, Cataldo Basile, Roberto Sassu, Mario Nemirovsky, Francesco Ciaccia, Michael Georgiades, Savvas Charalambides, Jarkko Kuusijärvi, Francesca Bosco:
Virtualized security at the network edge: a user-centric approach. IEEE Commun. Mag. 53(4): 176-186 (2015) - [j22]Diana Berbecaru, Antonio Lioy:
Exploiting the European Union trusted service status list for certificate validation in STORK: design, implementation, and lessons learnt. Softw. Pract. Exp. 45(11): 1457-1477 (2015) - [j21]Cataldo Basile, Antonio Lioy:
Analysis of Application-Layer Filtering Policies With Application to HTTP. IEEE/ACM Trans. Netw. 23(1): 28-41 (2015) - [c55]Ludovic Jacquin, Antonio Lioy, Diego R. López, Adrian L. Shaw, Tao Su:
The Trust Problem in Modern Network Infrastructures. CSP Forum 2015: 116-127 - [c54]Cataldo Basile, Antonio Lioy, Christian Pitscheider, Fulvio Valenza, Marco Vallini:
A novel approach for integrating security policy enforcement with dynamic network virtualization. NetSoft 2015: 1-5 - [c53]Roberto Bonafiglia, Francesco Ciaccia, Antonio Lioy, Mario Nemirovsky, Fulvio Risso, Tao Su:
Offloading personal security applications to a secure and trusted network node. NetSoft 2015: 1-2 - [c52]Cataldo Basile, Antonio Lioy, Christian Pitscheider, Shilong Zhao:
A Formal Model of Policy Reconciliation. PDP 2015: 587-594 - [c51]Fulvio Valenza, Serena Spinoso, Cataldo Basile, Riccardo Sisto, Antonio Lioy:
A formal model of network policy analysis. RTSI 2015: 516-522 - 2014
- [c50]Cataldo Basile, Daniele Canavese, Antonio Lioy, Fulvio Valenza:
Inter-technology Conflict Analysis for Communication Protection Policies. CRiSIS 2014: 148-163 - [c49]Chris Dalton, Antonio Lioy, Diego R. López, Fulvio Risso, Roberto Sassu:
Exploiting the Network for Securing Personal Devices. CSP Forum 2014: 16-27 - [c48]Roberto Sassu, Gianluca Ramunno, Antonio Lioy:
Practical Assessment of Biba Integrity for TCG-Enabled Platforms. TrustCom 2014: 495-504 - 2013
- [j20]Diana Berbecaru, Matteo Maria Casalino, Antonio Lioy:
FcgiOCSP: a scalable OCSP-based certificate validation system exploiting the FastCGI interface. Softw. Pract. Exp. 43(12): 1489-1518 (2013) - [c47]Leucio Antonio Cutillo, Antonio Lioy:
Privacy-by-design cloud computing through decentralization and real life trust. P2P 2013: 1-2 - [c46]Cataldo Basile, Daniele Canavese, Antonio Lioy, Christian Pitscheider:
Improved Reachability Analysis for Security Management. PDP 2013: 534-541 - [c45]Leucio Antonio Cutillo, Antonio Lioy:
Towards Privacy-by-Design Peer-to-Peer Cloud Computing. TrustBus 2013: 85-96 - 2012
- [j19]Cataldo Basile, Alberto Cappadonia, Antonio Lioy:
Network-Level Access Control Policy Analysis and Transformation. IEEE/ACM Trans. Netw. 20(4): 985-998 (2012) - [c44]Cataldo Basile, Antonio Lioy, Stefano Paraboschi:
The PoSecCo Security Decision Support System. ISSE 2012: 64-74 - [e5]Ramjee Prasad, Károly Farkas, Andreas U. Schmidt, Antonio Lioy, Giovanni Russello, Flaminia L. Luccio:
Security and Privacy in Mobile Information and Communication Systems - Third International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 94, Springer 2012, ISBN 978-3-642-30243-5 [contents] - 2011
- [j18]Giovanni Cabiddu, Emanuele Cesena, Roberto Sassu, Davide Vernizzi, Gianluca Ramunno, Antonio Lioy:
The Trusted Platform Agent. IEEE Softw. 28(2): 35-41 (2011) - [j17]Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, Antonio Lioy:
On the Performance of Secure Vehicular Communication Systems. IEEE Trans. Dependable Secur. Comput. 8(6): 898-912 (2011) - [j16]Marco Domenico Aime, Antonio Lioy, Paolo Carlo Pomi:
Automatic (Re)Configuration of IT Systems for Dependability. IEEE Trans. Serv. Comput. 4(2): 110-124 (2011) - [c43]Emanuele Cesena, Gianluca Ramunno, Roberto Sassu, Davide Vernizzi, Antonio Lioy:
On scalability of remote attestation. STC@CCS 2011: 25-30 - [c42]Diana Berbecaru, Antonio Lioy, Marco Domenico Aime:
Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access. TrustBus 2011: 13-23 - 2010
- [j15]Diana Berbecaru, Luca Albertalli, Antonio Lioy:
The ForwardDiffSig Scheme for Multicast Authentication. IEEE/ACM Trans. Netw. 18(6): 1855-1868 (2010) - [c41]Cataldo Basile, Antonio Lioy, Marco Vallini:
Towards a Network-Independent Policy Specification. PDP 2010: 649-653 - [p2]Antonio Lioy, Gianluca Ramunno:
Trusted Computing. Handbook of Information and Communication Security 2010: 697-717 - [e4]Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian:
Security and Privacy in Mobile Information and Communication Systems - Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 47, Springer 2010, ISBN 978-3-642-17501-5 [contents]
2000 – 2009
- 2009
- [j14]Diana Berbecaru, Amarkumar Desai, Antonio Lioy:
A unified and flexible solution for integrating CRL and OCSP into PKI applications. Softw. Pract. Exp. 39(10): 891-921 (2009) - [c40]Cataldo Basile, Antonio Lioy, Salvatore Scozzi, Marco Vallini:
Ontology-Based Policy Translation. CISIS 2009: 117-126 - [c39]Alessandro Giambruno, Muhammad Awais Shibli, Sead Muftic, Antonio Lioy:
MagicNET: XACML authorization policies for mobile agents. ICITST 2009: 1-7 - [c38]Muhammad Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy:
MagicNET: Security System for Development, Validation and Adoption of Mobile Agents. NSS 2009: 389-396 - 2008
- [c37]Antonio Lioy, Gianluca Ramunno, Davide Vernizzi:
Trusted-Computing Technologies for the Protection of Critical Information Systems. CISIS 2008: 77-83 - [c36]Cataldo Basile, Alberto Cappadonia, Antonio Lioy:
Geometric Interpretation of Policy Specification. POLICY 2008: 78-81 - [e3]Steven Furnell, Sokratis K. Katsikas, Antonio Lioy:
Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings. Lecture Notes in Computer Science 5185, Springer 2008, ISBN 978-3-540-85734-1 [contents] - [i1]Panos Papadimitratos, Giorgio Calandriello, Jean-Pierre Hubaux, Antonio Lioy:
Impact of Vehicular Communications Security on Transportation Safety. CoRR abs/0808.2666 (2008) - 2007
- [j13]Marco Domenico Aime, Giorgio Calandriello, Antonio Lioy:
Dependability in Wireless Networks: Can We Rely on WiFi? IEEE Secur. Priv. 5(1): 23-29 (2007) - [c35]Diana Berbecaru, Antonio Lioy:
On the Robustness of Applications Based on the SSL and TLS Security Protocols. EuroPKI 2007: 248-264 - [c34]Andrea S. Atzeni, Antonio Lioy:
An Estimation of Attack Surface to Evaluate Network (in)security. ICEIS (3) 2007: 493-497 - [c33]Giorgio Calandriello, Panos Papadimitratos, Jean-Pierre Hubaux, Antonio Lioy:
Efficient and robust pseudonymous authentication in VANET. Vehicular Ad Hoc Networks 2007: 19-28 - [c32]Cataldo Basile, Antonio Lioy, Gregorio Martínez Pérez, Félix J. García Clemente, Antonio Fernandez Gómez-Skarmeta:
POSITIF: A Policy-Based Security Management System. POLICY 2007: 280 - 2006
- [j12]Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala:
PKI past, present and future. Int. J. Inf. Sec. 5(1): 18-29 (2006) - [c31]Massimiliano Pala, Antonio Lioy:
Fighting E-Mail Abuses: The EMPE Approach. EuroPKI 2006: 130-144 - [c30]Marco Domenico Aime, Giorgio Calandriello, Antonio Lioy:
A Wireless Distributed Intrusion Detection System and a New Attack Model. ISCC 2006: 35-40 - [c29]Antonio Lioy:
Security Analysis and Configuration of Large Networks. ISSE 2006: 259-265 - [p1]Andrea S. Atzeni, Antonio Lioy:
Why to adopt a security metric? A brief survey. Quality of Protection 2006: 1-12 - [e2]Andrea S. Atzeni, Antonio Lioy:
Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings. Lecture Notes in Computer Science 4043, Springer 2006, ISBN 3-540-35151-5 [contents] - 2005
- [c28]Marco Domenico Aime, Antonio Lioy, Gianluca Ramunno:
Decentralised Access Control in 802.11 Networks. Communications and Multimedia Security 2005: 180-190 - [c27]Antonio Lioy, Gianluca Ramunno, Marco Domenico Aime, Massimiliano Pala:
Motivations for a Theoretical Approach to WYSIWYS. Communications and Multimedia Security 2005: 289-290 - [c26]Marco Domenico Aime, Andrea S. Atzeni, Antonio Lioy:
The Wireless Opaque Channel to Contrast Information Leakage. WOWMOM 2005: 570-575 - [c25]Marco Domenico Aime, Antonio Lioy:
Incremental Trust: Building Trust from Past Experience. WOWMOM 2005: 603-608 - 2004
- [c24]Antonio Lioy, Gianluca Ramunno:
Multiple electronic signatures on multiple documents. EGCDMAS 2004: 24-34 - [c23]Antonio Lioy, Marius Marian, Natalia Moltchanova, Massimiliano Pala:
The EuroPKI Experience. EuroPKI 2004: 14-27 - [c22]Diana Berbecaru, Antonio Lioy:
Preliminary Steps in Designing and Implementing a Privilege Verifier for PMI. ICWI 2004: 317-324 - 2003
- [e1]Antonio Lioy, Daniele Mazzocchi:
Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings. Lecture Notes in Computer Science 2828, Springer 2003, ISBN 3-540-20185-8 [contents] - 2002
- [c21]Diana Berbecaru, Antonio Lioy, Marius Marian, Diana Marano:
Secure Digital Administration in Medical Environment. ICWI 2002: 299-306 - [c20]Diana Berbecaru, Antonio Lioy, Marius Marian:
Security aspects in standard certificate revocation mechanisms: a case study for OCSP. ISCC 2002: 484-489 - 2001
- [j11]Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino:
Synthesis of power-managed sequential components based oncomputational kernel extraction. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 20(9): 1118-1131 (2001) - [c19]Madalina Baltatu, Antonio Lioy, Dario Lombardo, Daniele Mazzocchi:
Towards a policy system for IPsec: issues and an experimental implementation. ICON 2001: 146-151 - [c18]Diana Berbecaru, Antonio Lioy, Marius Marian:
On the Complexity of Public-Key Certificate Validation. ISC 2001: 183-203 - 2000
- [j10]Madalina Baltatu, Antonio Lioy, Fabio Maino, Daniele Mazzocchi:
Security issues in control, management and routing protocols. Comput. Networks 34(6): 881-894 (2000) - [c17]Madalina Baltatu, Antonio Lioy, Daniele Mazzocchi:
Security policy system: status and perspective. ICON 2000: 278-284 - [c16]Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Diana Berbecaru, Antonio Lioy, Fabio Maino:
A Flexible Management Framework for Certificate Status Validation. SEC 2000: 481-490
1990 – 1999
- 1999
- [j9]Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino:
Automatic Synthesis of Large Telescopic Units Based on Near-Minimum Timed Supersetting. IEEE Trans. Computers 48(8): 769-779 (1999) - [c15]Bogdan Costinescu, Dan Dragomirescu, Antonio Lioy, Cristian Marinescu:
A Component-based Infrastructure for Building Cluster Management and Monitoring Tools. PDPTA 1999: 2041-2047 - 1998
- [c14]Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino:
Computational Kernels and their Application to Sequential Power Optimization. DAC 1998: 764-769 - [c13]Luca Benini, Giovanni De Micheli, Antonio Lioy, Enrico Macii, Giuseppe Odasso, Massimo Poncino:
Timed Supersetting and the Synthesis of Telescopic Units. Great Lakes Symposium on VLSI 1998: 331-337 - 1997
- [c12]Gianpiero Cabodi, Paolo Camurati, Antonio Lioy, Massimo Poncino, Stefano Quer:
A parallel approach to symbolic traversal based on set partitioning. CHARME 1997: 167-184 - [c11]Antonio Lioy, Enrico Macii, Massimo Poncino, Massimo Rossello:
Accurate Entropy Calculation for Large Logic Circuits Based on Output Clustering. Great Lakes Symposium on VLSI 1997: 70- - [c10]Antonio Lioy, Fabio Maino, Marco Mezzalama:
Secure document management and distribution in an open network environment. ICICS 1997: 109-117 - [c9]Daniel Alberto Galliano, Antonio Lioy, Fabio Maino:
Non-intrusive authentication. SEC 1997: 440-451 - 1994
- [c8]Luciano Lavagno, Antonio Lioy, Michael Kishinevsky:
Testing redundant asynchronous circuits by variable phase splitting. EURO-DAC 1994: 328-333 - 1993
- [j8]Antonio Lioy, Massimo Poncino:
A study of the resetability of synchronous sequential circuits. Microprocess. Microprogramming 38(1-5): 395-402 (1993) - [j7]Antonio Lioy:
On the Equivalence of Fanout-Point Faults. IEEE Trans. Computers 42(3): 268-271 (1993) - [c7]Antonio Lioy, Massimo Poncino:
On the Resetability of Synchronous Sequential Circuits. ISCAS 1993: 1507-1510 - 1992
- [j6]Antonio Lioy:
Advanced Fault Collapsing (Logic Circuits Testing). IEEE Des. Test Comput. 9(1): 64-71 (1992) - [j5]Hassan A. Farhat, Steven G. From, Antonio Lioy:
A quadratic programming approach to estimating the testability and coverage distributions of a VLSI circuit. Microprocess. Microprogramming 35(1-5): 479-483 (1992) - 1991
- [c6]Antonio Lioy, Massimo Poncino:
A hierarchical multi-level test generation system. Great Lakes Symposium on VLSI 1991: 54-59 - [c5]Antonio Lioy, Enrico Macii, Angelo Raffaele Meo, Matteo Sonza Reorda:
An algebraic approach to test generation for sequential circuits. Great Lakes Symposium on VLSI 1991: 115-120 - [c4]Antonio Lioy:
Looking for Functional Fault Equivalence. ITC 1991: 858-863 - [c3]E. Calia, Antonio Lioy:
Test generation in a distributed environment. SPDP 1991: 700-707 - 1990
- [j4]Paolo Camurati, Antonio Lioy, Paolo Prinetto, Matteo Sonza Reorda:
Assessing the diagnostic power of test pattern sets. Microprocessing and Microprogramming 30(1-5): 413-419 (1990) - [j3]Antonio Lioy, Marco Mezzalama:
Automatic compaction of microcode. Microprocess. Microsystems 14(1): 21-29 (1990) - [c2]Paolo Camurati, Antonio Lioy, Paolo Prinetto, Matteo Sonza Reorda:
Diagnosis oriented test pattern generation. EURO-DAC 1990: 470-474
1980 – 1989
- 1989
- [j2]S. Gai, Antonio Lioy:
A multilevel hardware description language. Microprocess. Microprogramming 25(1-5): 183-187 (1989) - 1988
- [c1]Antonio Lioy:
Adaptative backtrace and dynamic partitioning enhance ATPG. ICCD 1988: 62-65 - 1984
- [j1]Antonio Lioy, Marco Mezzalama:
A testability measure to improve algebraic test generation. Softw. Microsystems 3(2): 37-41 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint